CVE-2025-24689

5.9 MEDIUM

📋 TL;DR

The Import and export users and customers WordPress plugin versions up to 1.27.12 contains a vulnerability where sensitive information can be inserted into externally accessible files or directories. This allows attackers to retrieve embedded sensitive data such as user credentials or configuration details. WordPress administrators using this plugin are affected.

💻 Affected Systems

Products:
  • Import and export users and customers WordPress plugin
Versions: n/a through 1.27.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with this plugin enabled. No specific OS requirements.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could retrieve sensitive user data, credentials, or configuration files leading to complete site compromise, data theft, or privilege escalation.

🟠

Likely Case

Unauthorized access to user information, potential credential exposure, and limited data exfiltration from vulnerable WordPress installations.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to information disclosure without system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to vulnerable plugin functionality. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.27.13 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/import-users-from-csv-with-meta/vulnerability/wordpress-import-and-export-users-and-customers-plugin-1-27-12-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Import and export users and customers'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.27.13+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched version can be installed

wp plugin deactivate import-users-from-csv-with-meta

Restrict plugin access

linux

Use web application firewall or .htaccess to restrict access to plugin directories

# Add to .htaccess in plugin directory:
Order deny,allow
Deny from all

🧯 If You Can't Patch

  • Disable the Import and export users and customers plugin immediately
  • Implement strict file permissions and directory access controls for WordPress plugin directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Import and export users and customers' version 1.27.12 or earlier

Check Version:

wp plugin get import-users-from-csv-with-meta --field=version

Verify Fix Applied:

Verify plugin version is 1.27.13 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns to plugin directories
  • Multiple failed attempts to access sensitive plugin files
  • Unexpected file read operations in WordPress logs

Network Indicators:

  • HTTP requests to plugin-specific endpoints with unusual parameters
  • Traffic patterns indicating data exfiltration from plugin directories

SIEM Query:

source="wordpress.log" AND ("import-users-from-csv" OR "import and export users") AND ("file read" OR "access denied" OR "sensitive")

🔗 References

📤 Share & Export